Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 06:38

General

  • Target

    3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe

  • Size

    660KB

  • MD5

    3c55af3c92b682b83773ef3a99281f7c

  • SHA1

    2ae250bd641fee2cb6736da37a1a329ac2f0bbd9

  • SHA256

    73c65dfa67b61fd31bc3a58da5c919e60bcaffe66e3b8dc3710c085dac272830

  • SHA512

    935783d7b0c520925a72389e1b43af3d7a1cb337f0f70a2fe80f0b2ec4dbccae54250c985da7f2bd74e783594c6dbe90d8d5aaa4e7da1533e7a4522b3847f950

  • SSDEEP

    12288:rkoICAa5jUPa9ZDNNSBZpkJqRl7k86fpgBDDJrS7LE9HTFIUYVRSs5KHwY:IoICAsjVRmsJS7kF6lDJqLGT4RSsk

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies registry class 9 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4140
    • C:\Users\Admin\AppData\Local\Temp\3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\3c55af3c92b682b83773ef3a99281f7c_JaffaCakes118.exe"
      2⤵
      • Checks BIOS information in registry
      • Adds Run key to start application
      • Drops file in Windows directory
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Windows\rundll32.exe
        "C:\Windows\rundll32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1532
        • C:\Windows\rundll32.exe
          "C:\Windows\rundll32.exe"
          4⤵
          • Checks BIOS information in registry
          • Executes dropped EXE
          • NTFS ADS
          • Suspicious use of AdjustPrivilegeToken
          PID:4552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\TEMP:A7E78C07

    Filesize

    129B

    MD5

    2e3a76c680f42dcc0a34fb9f83141b1b

    SHA1

    b5f1b0c2f5e356772535dc319c42cb7fc9858663

    SHA256

    54185276b52333a128b7d9df649f558c30dc130345cdb548795d3ad7327182ab

    SHA512

    a7e16b8d8d10a49b9c97b4907216fbf547e3ccec10974599ef4b607259bb9a326c93ae3f8af0021a61178010f532cbf886d8d4f980827a19af5e5e7a0cf58650

  • C:\Windows\rundll32.exe

    Filesize

    660KB

    MD5

    3c55af3c92b682b83773ef3a99281f7c

    SHA1

    2ae250bd641fee2cb6736da37a1a329ac2f0bbd9

    SHA256

    73c65dfa67b61fd31bc3a58da5c919e60bcaffe66e3b8dc3710c085dac272830

    SHA512

    935783d7b0c520925a72389e1b43af3d7a1cb337f0f70a2fe80f0b2ec4dbccae54250c985da7f2bd74e783594c6dbe90d8d5aaa4e7da1533e7a4522b3847f950

  • memory/1532-56-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4140-0-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4140-36-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4140-19-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4484-14-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4484-15-0x0000000002180000-0x0000000002215000-memory.dmp

    Filesize

    596KB

  • memory/4484-16-0x0000000002180000-0x0000000002215000-memory.dmp

    Filesize

    596KB

  • memory/4484-13-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4484-21-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4484-22-0x0000000002180000-0x0000000002215000-memory.dmp

    Filesize

    596KB

  • memory/4484-12-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4484-33-0x0000000002180000-0x0000000002215000-memory.dmp

    Filesize

    596KB

  • memory/4484-9-0x0000000002180000-0x0000000002215000-memory.dmp

    Filesize

    596KB

  • memory/4484-39-0x0000000002180000-0x0000000002215000-memory.dmp

    Filesize

    596KB

  • memory/4484-38-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4484-3-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4484-4-0x0000000002180000-0x0000000002215000-memory.dmp

    Filesize

    596KB

  • memory/4552-48-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4552-49-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4552-50-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4552-51-0x00000000006D0000-0x0000000000765000-memory.dmp

    Filesize

    596KB

  • memory/4552-52-0x00000000006D0000-0x0000000000765000-memory.dmp

    Filesize

    596KB

  • memory/4552-40-0x00000000006D0000-0x0000000000765000-memory.dmp

    Filesize

    596KB

  • memory/4552-59-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4552-60-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4552-61-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4552-62-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4552-63-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB

  • memory/4552-64-0x0000000000400000-0x0000000000520000-memory.dmp

    Filesize

    1.1MB